Table of Contents

Processing the DEFCON 26 CTF PCAPS using Trisul NSM

With the right tools, analyzing large PCAP dumps can be lots of fun. This article is a step-by-step of using TrisulNSM to dive into the DEFCON26 CTF PCAP 1)

Given only a large PCAP dump, your first task as an analyst is to make sense of it from multiple angles. I typically like to start off with a statistical overview.

  1. What is the timeframe of the CTF?
  2. What was the bandwidth used over the time duration ?
  3. What were the top IPs as attackers and as targets?
  4. What ports were targeted?
  5. Any red flags from IDS like Snort/Suricata over the duration?
  6. Top flows download/upload
  7. then once you have a baseline, You can follow several tracks to investigate in depth. Down to the packet level.

TrisulNSM (Trisul Network Analytics) is the leading platform today for performing this kind of analysis over very large PCAP files. This article describes how you can use our free docker image trisulnsm/trisul6 to slurp this PCAP and then have some fun analyzing it. The docker image runs a 2-pass analysis with TrisulNSM and then with Suricata and then presents a unified analysis.

Get started

So,lets get started. We assume you have a fairly decent Linux machine ready with Docker installed. Any distro will do because we are going to be using our Docker image.

  1. Download the DEFCON26 PCAP , a 5GB file into a directory.
  2. Unrar the file and extract the inside PCAP into a filename without spaces such as dc26ctf.pcap
  3. Create a directory on your system where the results will be stored. Move the PCAP to that directory so the docker container can see the PCAP file.
mkdir /opt/trisulroot
mv dc26ctf.pcap /opt/trisulroot

Run the trisulnsm/trisul6 docker image over the PCAP and run the webserver over port 4000.

 sudo docker run  --privileged=true  \
     --name=trisul1a    \
      --net=host -v /opt/trisulroot:/trisulroot   \
        -d trisulnsm/trisul6 \
         --pcap dc26ctf.pcap \
           --webserver-port 4000

You can check the docker logs if the process kicked off successfully.

docker logs trisul1a -f

If there are no errors here, it means the process has been kicked off. Expect anywhere from 20 minutes to an hour depending on your computer's CPU/Memory/SSD configuration 2).

To monitor the progress login to the container and do the following.

root@unpl:~# docker exec -it trisul1a /bin/bash
docker$  # to view process usage 
docker$  top
 
docker$  # add helper macros for trisul
docker$  source /usr/local/share/trisul-probe/trisbashrc dc26ctf1
 
docker$  # tail the log files 
docker$  tailf.ns

You might want to take a break and have a coffee !! When you get back you can login to http://ip:4000 to analyze the fun stuff.

Screenshots

After the processing is complete. You can view the results from the web interface. Here are some sample leads.

Retro Counters

Click on Retro > Retro Counters to view a Timeline showing traffic bandwidth. Here we see between 10 and 100Mbps spanning a 3-day period of the competition. From here you can select any timewindow and drill down into Counters.

Trend

Clicking the Topper Trends tab in Retro counters gives you a timeseries view of top activity of hosts, apps, VLANs.

Top flows

Click on Dashboards > Sessions to see top flows by volume, long lived flows, download, upload. This is a really good place to start because in many CTF or even enterprise loads - elephant flows 3) dominate the overall volume of data. Here we see a single flow from IP 10.13.37.8 pushing nearly 800MB in a 10 Min transfer.

PCAP totals dashboard

Open Dashboards > Show All > PCAP Totals

The PCAP Totals dashboard is an excellent place to start off your analysis. On a single dashboard you can see the traffic details, number of unique host, apps, VLANS, TLS Certificates, IDS Alerts, HTTP URLS, SNI, JA3 TLS Fingerprints, and over 40 other types of metrics. You can then click on them to drill down further.

Edge Graph Analytics

You can click on the small blue button next to any table item and open “Edge Graph” to reveal neighboring items. Here we went from PCAP Totals > Click on HTTP Status > Then on the weird looking “Status 123”

Exploring HTTP Status 123

IDS Alerts, attacks on Drupal

Select Alerts > Show All > IDS to show the IDS alert categories seen. You can then click on an alert to drill down further or pull up PCAPs.

Pivot to packets from anywhere

Trisul lets you seamlessly pivot from any analysis point to PCAPs. You can pull down entire PCAP or use the super nifty “PCAP Headers” to only see the top of the PCAP. In the PCAP headers, we show the 'strings' seen in the PCAP header, the actual Hexdump, and a TSHARK like packet summary.

Conversations of a particular hosts

Click on Dashboards > Hosts > Then on any host and “Explore Flows” to bring up the Flow explorer. In TrisulNSM, every flow is stored for instant recall. You can also select Tools > Explore Flows > Then enter a query expression in the box to retrieve flows.

Port connections over time

The last one here is quite interesting. Go to Retro Counters > Select the entire Time interval and then select “Apps”. We find that CTF contestants attacking different ports on different days. Hmm, maybe something to look deeper into.

Conclusion

Hope network analysis enthusiasts find this useful. The docker image bundles a Free License of Trisul. PCAP dumps upto 3 days in time can be imported.

You can also install TrisulNSM natively on your Ubuntu or CentOS and then import the PCAPs there. The Docker image however makes it really easy.

1)
The PCAPs can be accessed from the DEFCON 26 CTF Competition website
2)
Since Trisul is a streaming analytics platform, the time taken to process a PCAP dump is linked to the time duration of the PCAP, rather than the volume of traffic
3)
Elephant flows are large volume flows that dominate the bulk of the data transfer